- Erik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida:
SoK: Benchmarking Flaws in Systems Security. EuroS&P 2019: 310-325 - Laurens Sion, Katja Tuma, Riccardo Scandariato, Koen Yskout, Wouter Joosen:
Towards Automated Security Design Flaw Detection. ASE Workshops 2019: 49-56 - M. Junaid Gul, Rabia Riaz, Yaser Jararweh, M. Mazhar Rathore, Anand Paul:
Security Flaws of Operating System Against Live Device Attacks: A case study on live Linux distribution device. SDS 2019: 154-159 - Bruno Forlin, Cezar Reinbrecht, Johanna Sepúlveda:
Security Aspects of Real-Time MPSoCs: The Flaws and Opportunities of Preemptive NoCs. VLSI-SoC (Selected Papers) 2019: 209-233 - Katja Tuma, Danial Hosseini, Kyriakos Malamas, Riccardo Scandariato:
Inspection Guidelines to Identify Security Design Flaws. CoRR abs/1906.01961 (2019) - 2018
- Hamid Bagheri, Eunsuk Kang, Sam Malek, Daniel Jackson:
A formal approach for detection of security flaws in the android permission system. Formal Aspects Comput. 30(5): 525-544 (2018) - Mohamed A. Abo-Soliman, Marianne A. Azer:
Enterprise WLAN Security Flaws: Current Attacks and relative Mitigations. ARES 2018: 34:1-34:8 - Simon Biggs, Damon Lee, Gernot Heiser:
The Jury Is In: Monolithic OS Design Is Flawed: Microkernel-based Designs Improve Security. APSys 2018: 16:1-16:7 - Kenneth Schmitz, Oliver Keszöcze, Jurij Schmidt, Daniel Große, Rolf Drechsler:
Towards Dynamic Execution Environment for System Security Protection Against Hardware Flaws. ISVLSI 2018: 557-562 - Erik Poll:
LangSec Revisited: Input Security Flaws of the Second Kind. IEEE Symposium on Security and Privacy Workshops 2018: 329-334 - Richard Bonett, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk:
Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation. USENIX Security Symposium 2018: 1263-1280 - Richard Bonett, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk:
Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation. CoRR abs/1806.09761 (2018) - (Withdrawn) The resin lens flaw feature extraction and detection system based on data transmission security. Multim. Tools Appl. 77(14): 18483-18501 (2018)
- 2017
- Hwankuk Kim, Kyungho Lee, Jongin Lim:
A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study. KSII Trans. Internet Inf. Syst. 11(9): 4588-4608 (2017) - John Gregor Fraser, Ahmed Bouridane:
Have the security flaws surrounding BITCOIN effected the currency's value? EST 2017: 50-55 - 2016
- (Withdrawn) Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof. IACR Cryptol. ePrint Arch. 2016: 862 (2016)
- (Withdrawn) Comments on "Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof". IACR Cryptol. ePrint Arch. 2016: 1139 (2016)
- 2015
- Dheerendra Mishra:
On the Security Flaws in ID-based Password Authentication Schemes for Telecare Medical Information Systems. J. Medical Syst. 39(1): 154 (2015) - Tianlong Yu, Vyas Sekar, Srinivasan Seshan, Yuvraj Agarwal, Chenren Xu:
Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things. HotNets 2015: 5:1-5:7 - Jaouhar Fattahi, Mohamed Mejri, Emil Pricop:
Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions. SMC 2015: 1189-1196 - Erik Poll, Joeri de Ruiter, Aleksy Schubert:
Protocol State Machines and Session Languages: Specification, implementation, and Security Flaws. IEEE Symposium on Security and Privacy Workshops 2015: 125-133 - J. Alex Halderman, Vanessa Teague:
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election. VoteID 2015: 35-53 - J. Alex Halderman, Vanessa Teague:
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election. CoRR abs/1504.05646 (2015) - 2014
- Tuomas Kortelainen:
On iteration-based security flaws in modern hash functions. University of Oulu, Finland, 2014 - Chunguang Ma, Ding Wang, Sendong Zhao:
Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst. 27(10): 2215-2227 (2014) - Tao Zhang, Sherman S. M. Chow:
Security of Direct Anonymous Authentication Using TPM 2.0 Signature - A Possible Implementation Flaw. Inscrypt 2014: 37-48 - Michele Peroli, Luca Viganò, Matteo Zavatteri:
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version). Security Protocols Workshop 2014: 69-90 - Michele Peroli, Luca Viganò, Matteo Zavatteri:
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version). CoRR abs/1405.6912 (2014) - 2013
- Giancarlo Pellegrino:
Detection of logic flaws in multi-party business applications via security testing. (Détection d'anomalies logiques dans les logiciels d'entreprise multi-partis à travers des tests de sécurité). Télécom ParisTech, France, 2013 - Hu Xiong, Jian-bin Hu, Zhong Chen:
Security Flaw of an ECC-based Signcryption Scheme with Anonymity. Int. J. Netw. Secur. 15(4): 317-320 (2013)